Genel, Güvenlik
Fortigate Multiple İnterfaces Policies Nedir ?

Fortigate Multiple İnterfaces Policies Nedir ?

Herkese Merhaba,

Fortigate’ in Multiple İnterfaces Policies özelliğinden bahsedeceğiz. Ne işimize yarar diye düşünürsek normalde source ve destination interface eklediğimiz kuralları düşünün ve onu sources ve destinations olarak değiştirelim kısaca kural kalabalığından kurtarıyor diyebiliriz.

Dezavantaj olarak ise (makalenin sonunda farkı göstereceğim) kural ekranımızdaki default ta gelen INTERFACE PAIR görünümünü kapatıyor ve BY SEQUENCE moduna geçiyor. Çünkü kuralımız tek bir interface olmayacağı için bu ayarlama yapılamıyor.

Örnek olarak bir yere VPN vermek istiyorsunuz. Port1 ve Port2 interfaceleri ayrı networkler olduğunu düşünelim. Bunun için VPN to Port1 ve VPN to Port2 diye 2 ayrı kural yapmam lazım. Bu anlatacağım özellik sayesinde tek kural ile VPN to Port1 and Port2 yapabiliyor olacağım ve tek kural da işimi çözmüş olacağım .

Nasıl yapıldığına geçelim;

İlk olarak System > Feature Select sayfasına gelip MULTIPLE INTERFACE POLICIES özelliğini aktif ediyoruz.

Bunu yaptıktan sonra yeni bir kural oluşturuyoruz.

Gördüğünüz gibi birden fazla source ve destination interface e sahip bir kural oluşturduk ok diyerek kaydediyoruz.

Ve gördüğünüz gibi kuralımız belirlediğimiz portlarla oluştu.

İşinize Yaraması Dileğiyle..

BY SEQUENCE görünümü

INTERFACE PAIR görünümü

Share this Story

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

The Hacker News

  • New Flaw in Acer Laptops Could Let Attackers Disable Secure Boot Protection
    by [email protected] (Ravie Lakshmanan) on 29 Kasım 2022 at 16:39

    Acer has released a firmware update to address a security vulnerability that could be potentially weaponized to turn off UEFI Secure Boot on affected machines. Tracked as CVE-2022-4020, the high-severity vulnerability affects five different models that consist of Aspire A315-22, A115-21, and A315-22G, and Extensa EX215-21 and EX215-21G. The PC maker described the vulnerability as

  • Hackers Using Trending TikTok 'Invisible Challenge' to Spread Malware
    by [email protected] (Ravie Lakshmanan) on 29 Kasım 2022 at 11:59

    Threat actors are capitalizing on a popular TikTok challenge to trick users into downloading information-stealing malware, according to new research from Checkmarx. The trend, called Invisible Challenge, involves applying a filter known as Invisible Body that just leaves behind a silhouette of the person's body. But the fact that individuals filming such videos could be undressed has led to a

  • 7 Cyber Security Tips for SMBs
    by [email protected] (The Hacker News) on 29 Kasım 2022 at 11:30

    When the headlines focus on breaches of large enterprises like the Optus breach, it’s easy for smaller businesses to think they’re not a target for hackers. Surely, they’re not worth the time or effort?  Unfortunately, when it comes to cyber security, size doesn’t matter.  Assuming you’re not a target leads to lax security practices in many SMBs who lack the knowledge or expertise to put simple

  • Irish Regulator Fines Facebook $277 Million for Leak of Half a Billion Users' Data
    by [email protected] (Ravie Lakshmanan) on 29 Kasım 2022 at 08:25

    Ireland's Data Protection Commission (DPC) has levied fines of €265 million ($277 million) against Meta Platforms for failing to safeguard the personal data of more than half a billion users of its Facebook service, ramping up privacy enforcement against U.S. tech firms. The fines follow an inquiry initiated by the European regulator on April 14, 2021, close on the heels of a leak of a "collated

  • CISA Warns of Actively Exploited Critical Oracle Fusion Middleware Vulnerability
    by [email protected] (Ravie Lakshmanan) on 29 Kasım 2022 at 04:20

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical flaw impacting Oracle Fusion Middleware to its Known Exploited Vulnerabilities (KEV) Catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2021-35587, carries a CVSS score of 9.8 and impacts Oracle Access Manager (OAM) versions 11.1.2.3.0, 12.2.1.3.0, and 12.2.1.4.0. <!-